Shelly Cashman Series Discovering Computers A Link

advertisement
Teachers Discovering Computers
Integrating Technology and
Digital Media in the Classroom
7th Edition
Chapter 8
Security Issues and Ethics
in Education
Chapter Objectives
 Identify security risks that threaten home and
school computers
 Describe how computer viruses and malicious
software programs work and the steps you can
take to prevent viruses
 Describe different ways schools safeguard
computers and networks
 Explain why computer backup is important and
how it is accomplished
Chapter 8: Security Issues and Ethics in Education
2
Chapter Objectives
 Define what is meant by information privacy and
its impact on schools
 Identify the components of copyright that impact
education
 Describe the ethical issues related to Internet
usage and steps schools are taking to address
them
 Identify safe and healthy uses of technology
resources
Chapter 8: Security Issues and Ethics in Education
3
Computer Security:
Risks and Safeguards
 Computer security risk - Any event or action that has
the potential of causing a loss of computer equipment,
software, data and information, or processing
capability
 Any illegal act involving a computer generally is
referred to as a computer crime
 Computer Viruses






New virus programs found every day
Boot sector virus
File virus
Macro virus
Worm
Trojan horse
Chapter 8: Security Issues and Ethics in Education
4
Chapter 8: Security Issues and Ethics in Education
5
Chapter 8: Security Issues and Ethics in Education
6
Chapter 8: Security Issues and Ethics in Education
7
Computer Security:
Risks and Safeguards
 Computer Viruses
 Logic bomb
 Time bomb
 Michelangelo virus
Chapter 8: Security Issues and Ethics in Education
8
Discussion:
Which of the following would you most likely check
for viruses?
1. a previously used flash drive borrowed from a
friend
2. a shareware program found in a bin at a fleamarket
3. software still in shrink-wrap from a computer
store
4. a program downloaded from a bulletin board
5. e-mail from an unfamiliar source
Chapter 8: Security Issues and Ethics in Education
9
Computer Security:
Risks and Safeguards
 Virus Detection and
Removal
 Antivirus programs
 Popular antivirus
programs
 Many options to using
antivirus software
 Rescue disc
 Virus hoaxes
Chapter 8: Security Issues and Ethics in Education
10
Computer Security:
Risks and Safeguards
 Unauthorized Access and
Use
 Crackers and hackers
 Access controls
 Identification
 Authentication
 Selecting a password
 Protecting your
password
Chapter 8: Security Issues and Ethics in Education
11
Computer Security:
Risks and Safeguards
 Possessed Objects and Biometric Devices
 A possessed object is any item that you must carry
to gain access to a computer or computer facility
 Badges, cards, smart cards, and keys
 Personal Identification Number (PIN)
 Biometric devices authenticate a person’s identity
with a personal characteristic
Chapter 8: Security Issues and Ethics in Education
12
Computer Security:
Risks and Safeguards
 Firewall
 A security system consisting of hardware and/or
software that prevents unauthorized access to data
and information on a network
 Proxy server
 Personal firewall
Chapter 8: Security Issues and Ethics in Education
13
Computer Security:
Risks and Safeguards
Chapter 8: Security Issues and Ethics in Education
14
Computer Security:
Risks and Safeguards
 Hardware Theft and Vandalism
 Cable lock devices
 Portable equipment warrants special
considerations
 Computer vandalism
 Cutting cables
 Deleting software
 Smashing computer
Chapter 8: Security Issues and Ethics in Education
15
Computer Security:
Risks and Safeguards
 Software Theft
 Software piracy
 Software license
 Single-user license
 Multiple-user
 Network license
 Community/State license
Chapter 8: Security Issues and Ethics in Education
16
Computer Security:
Risks and Safeguards
 Information Theft
 Encryption
 Plain text
 Encrypted text
 Encryption key
Chapter 8: Security Issues and Ethics in Education
17
Computer Security:
Risks and Safeguards
 System Failure
 Undervoltage
 Brownout
 Blackout
 Overvoltage (power surge)
 Spike
 Surge protector
 Surge protector with phone line protection
 Uninterruptible power supply (UPS)
Chapter 8: Security Issues and Ethics in Education
18
Computer Security:
Risks and Safeguards
 Backing Up – The Ultimate Safeguard
 Backup
 Duplicate of a file, program, or disk that may be
used if the original is lost, damaged, or destroyed
 Backup procedures policies in schools and school
districts
 Backup programs
Chapter 8: Security Issues and Ethics in Education
19
Ethics and the Information Age
 Computer ethics
 Moral guidelines that govern the use of computers,
networks, and information systems
 Unauthorized use of computers
 Hardware, software, and information theft
 Information Privacy
 Copyright
 Existence of objectionable materials on the Internet
Chapter 8: Security Issues and Ethics in Education
20
Chapter 8: Security Issues and Ethics in Education
21
Ethics and the Information Age
 Information Privacy
 The right of individuals and organizations to deny
or restrict the collection and use of information
about them
 Unauthorized collection and use of information
 Electronic profiles
 Federal and state laws
Chapter 8: Security Issues and Ethics in Education
22
Chapter 8: Security Issues and Ethics in Education
23
Ethics and the Information Age
 Phishing
 Email attempting to obtain personal and financial
information
 Spam
 An unsolicited e-mail mess or newsgroup posting
sent to many recipients or newsgroups at once
 Average user receives more than 1,000 spam email messages each year
 Spam sent through instant messaging is called
spim
 Spam sent via Internet Telephony is called split
Chapter 8: Security Issues and Ethics in Education
24
Ethics and the Information Age
 Privacy Laws
 Business or government agencies should only
collect information necessary to carry out their
functions
 Restrict data access to those who must use it to
perform job duties
 Release personal information only after agreement
to disclosure by individual
 Must inform the individual when collecting
information
Chapter 8: Security Issues and Ethics in Education
25
Chapter 8: Security Issues and Ethics in Education
26
Ethics and the Information Age
 Employee and Student Monitoring
 Use of computers to observe, record, view, and
review an individual’s use of a computer
 Policies of computer use
 Acceptable Use Policy (AUP)
Chapter 8: Security Issues and Ethics in Education
27
Ethics and the Information Age
 Copyright Laws
 Copyright Act of 1976
 Illegal copying
 Fair use
 Copyright information on Web pages
Chapter 8: Security Issues and Ethics in Education
28
Ethics and the Information Age
 Copyright Laws
 Teacher and student
Web pages
 Copyright laws do
protect these pages
 Public domain Web
sites
 CDs and DVDs with
images, graphics,
audio, and video
clips
 Guidelines for
creating Web pages
Chapter 8: Security Issues and Ethics in Education
29
Chapter 8: Security Issues and Ethics in Education
30
Internet Ethics
and Objectionable Materials
 Three categories of objectionable material
 Pornographic material
 Racist literature, gambling
 Incorrect or inappropriate material
 Inaccurate information
Chapter 8: Security Issues and Ethics in Education
31
Internet Ethics
and Objectionable Materials
 Government Actions
 Children’s Internet Protection Act
 Protects children from obscene, pornographic, and
other information considered to be harmful to minors
Chapter 8: Security Issues and Ethics in Education
32
Internet Ethics
and Objectionable Materials
 Parental Controls
 Available in Windows
and Mac operating
systems
 Determine proper
controls for children in
different age groups
 Monitor child’s use of
computer
Chapter 8: Security Issues and Ethics in Education
33
Internet Ethics
and Objectionable Materials
 Parental Controls
 Filtering software
programs
Chapter 8: Security Issues and Ethics in Education
34
Internet Ethics
and Objectionable Materials
 Parental Controls
 Filtering software
 Check Internet browser’s history
Chapter 8: Security Issues and Ethics in Education
35
Internet Ethics
and Objectionable Materials
 Educational Controls
 Acceptable Use Policies (AUP)
 Use of network is a privilege, not a right
 Behave as if you are a guest on the Internet
 Rules concerning objectionable sites
 Rules concerning copyright issues
 Outline proper use of equipment
 Online safety and personal information
 Consequences of violating rules
Chapter 8: Security Issues and Ethics in Education
36
Chapter 8: Security Issues and Ethics in Education
37
WCC’s Technology Acceptable Use
Policy (TAUP)



PURPOSE: The purpose of the Wayne Community College's TAUP is to
enhance and support the educational mission of the college. This policy is
subordinate to all applicable laws of the State of North Carolina and the United
States of America. All students, faculty, staff and public patrons are
responsible for using WCC's technological resources in an effective, ethical
and lawful manner. Resources are defined, but not limited to: Internet, webbased applications, e-mail, computers, computer networks and
telecommunications, telephones and voice mail, and various multimedia and
educational technologies such as PCs, laptops, sympodiums, data projectors,
camcorders, VCR and DVD players, digital cameras, instructional
television, video microscopes, etc.
POLICY: Our goal is to promote educational excellence for all Wayne
Community College students, faculty, staff and patrons by facilitating resource
sharing, accessing outside information and research while encouraging
technological innovation and global communication. Based on this policy, the
following acceptable and unacceptable uses have been approved:
http://www.waynecc.edu/technology-at-wayne/taup/
Chapter 8: Security Issues and Ethics in Education
38
Green Computing
 Involves reducing the use of electricity and the
production of environmental waste while using a
computer
 Society and schools are taking measures to
combat it
Chapter 8: Security Issues and Ethics in Education
39
Health Issues
 Computers and Health Issues
 Musculoskeletal Disorder (MSD)
 Repetitive Strain Injury (RSI)
 Carpal Tunnel Syndrome (CTS)
 Hand Exercises
 Computer Vision Syndrome (CVS)
 Techniques to ease eyestrain
Chapter 8: Security Issues and Ethics in Education
40
Health Issues
 Ergonomics
 An applied
science
devoted to
incorporating
comfort,
efficiency, and
safety into the
design of items
in the
workplace
Chapter 8: Security Issues and Ethics in Education
41
Download